General

  • Target

    0b3e54738b8be69665f56214d6215f45cb83d0c98f256af0a584fadc5ed55c63

  • Size

    60KB

  • Sample

    220212-j9ehqabfbq

  • MD5

    b2d09ab607818c4aa6200487e8c8e5ae

  • SHA1

    63526d6c65dcde460db37d1353487de567ff969e

  • SHA256

    0b3e54738b8be69665f56214d6215f45cb83d0c98f256af0a584fadc5ed55c63

  • SHA512

    c8191c5e57cfcb9962ff06f06123e33fad848295e6bd3413b0aa84d75f5e6d364e701ee1aca6fa3f0e00074392a329c323d8ec58fae51b40dbda50a35217f6f3

Malware Config

Targets

    • Target

      0b3e54738b8be69665f56214d6215f45cb83d0c98f256af0a584fadc5ed55c63

    • Size

      60KB

    • MD5

      b2d09ab607818c4aa6200487e8c8e5ae

    • SHA1

      63526d6c65dcde460db37d1353487de567ff969e

    • SHA256

      0b3e54738b8be69665f56214d6215f45cb83d0c98f256af0a584fadc5ed55c63

    • SHA512

      c8191c5e57cfcb9962ff06f06123e33fad848295e6bd3413b0aa84d75f5e6d364e701ee1aca6fa3f0e00074392a329c323d8ec58fae51b40dbda50a35217f6f3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks